By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the Northeast IT & Security Leaders Forum and leave ready to inspire action within your Organization!
Master of Ceremonies
Helen Knight
Vice President, Information Technology, Legal Aid Alberta
Ritz Carlton Pentagon City
As Arlington’s premier luxury hotel, The Ritz-Carlton, Pentagon City offers an experience that beautifully blends modern luxury and traditional touches. Located minutes from Washington, D.C., this unforgettable Pentagon City, VA hotel allows guests to enjoy easy access to D.C.’s iconic landmarks, monuments, museums, and attractions.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda
2:00 PM - 5:00 PM EST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM EST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM EST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:50 AM EST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
7:50 AM - 8:00 AM EST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:45 AM EST
PANEL - IT's Role in the Future of Work
As organizations adapt to technological advancements, remote collaboration tools, and changing workforce dynamics, the IT Leader emerges as a key strategist, orchestrating digital transformation initiatives and ensuring seamless integration of technology into the fabric of the modern workplace. This Panel will discuss how IT can drive innovation, enhance cybersecurity measures, and foster a flexible and inclusive work environment to meet the challenges and opportunities presented by the future of work.
Moderator: Stephen Framil, Corporate Global Head of Accessibility, Merck
Panelists:
Paul Williams, CIO, Commonwealth of Virginia
Neil Gomes, CDO, Undisclosed
Rameshwar Balanagu, Chief Enterprise Architect, UNFI
Iqbal Ismail, Vice President, Product Development, Enterprise Risk Management, State Street
8:55 AM - 9:25 AM EST
WORKSHOP 1 - Cyber Defense Strategies for Earlier Detection and Faster Response
Delve into the flaws of the traditional cybersecurity landscape and how a modern SOC should focus on outcome-based services without relying on logs or the cost and complexity of a SIEM
Speaker: Hamlet Khodaverian, VP, Americas, LMNTRIX
Presented by: LMNTRIX
8:55 AM - 9:25 AM EST
WORKSHOP 2 - Wrangling Sensitive Data Sprawl: How to Shrink Your Data Protection Footprint
The footprint of sensitive data — such as PII, payment details and health information — is growing rapidly in many enterprises. Security officers contend by spreading their resources thinner, an impractical strategy in an era of scarce security talent and tight budgets. Join this interactive session to discuss the primary driver of sensitive data growth, the drawbacks of the common mitigation strategies, and an architectural paradigm shift that stops the sprawl of sensitive data while accelerating access to data for your most important innovators.
Speaker: Aaron Jensen, Senior Manager Solution Engineering & Devops Advisor, Delphix
Presented by: Delphix
9:35 AM - 10:05 AM EST
WORKSHOP 1 - Generative AI and it's Impact
Generative AI is revolutionizing the way we create content, from text and images to music and videos, by learning from vast datasets to produce new, original works. Its impact extends beyond the arts, influencing fields such as healthcare, where it can generate personalized treatment plans, and technology, by driving innovations in automation and user interfaces. However, this rapid advancement also raises ethical and societal concerns, including issues of copyright, privacy, and the potential for misuse in creating deepfakes or spreading misinformation.
Speaker: Tanweer Surve, Executive Director, Cloud Control Management, Wells Fargo
9:35 AM - 10:05 AM EST
WORKSHOP 2 - Using Data to Transform Care
Check back for updates on this session.
Speaker: Neil Gomes, CDO, Undisclosed
10:05 AM - 10:20 AM EST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:20 AM - 10:50 AM EST
WORKSHOP 1 - Get Proactive About Security and Protection from Emerging Threats
Too often, organizations are just reacting to vulnerabilities. Fortunately, we have tools that help take a proactive stance with solid intel backed by precise real-time data and actions.
In this session, we will discuss the three steps necessary to respond quickly and effectively to critical and high-severity issues.
- Visibility – Continually search and collect data on issues that could expose your environment to attacks and exploits originating at your endpoints.
- Control – Provide effective measures directly to your endpoints, enabling you to take immediate control of emerging issues.
- Remediation – Leverage relevant and actionable insights based on expert threat research team investigations.
When critical, highly exploitable, or zero-day vulnerabilities emerge, every second counts. We help our customers develop, verify, and test the content and actions to keep their environment safe.
Speaker: Nir Yosha, Director, Technical Account Management, Tanium
Presented by: Tanium
10:20 AM - 10:50 AM EST
WORKSHOP 2 - Security Posture Validation through Red and Purple Teaming Methodologies
Just as application development requires quality assurance and regression testing to deliver usability and function without defects, cybersecurity demands its own quality program to maintain strong defenses. Threats evolve and your attack surface sees continuous change, so security teams face a constant challenge to identify weaknesses, prevent drift, and strengthen overall resilience. Exposure management highlights the need for continuous validation to test controls and response capabilities. This session delves into security posture validation as the driver behind benchmarking cyber resilience.
Speaker: Aris Bega, Enterprise Solutions Engineer, Cymulate
Presented by: Cymulate
11:00 AM - 11:30 AM EST
FIRESIDE CHAT - Attracting IT Talent, Building Better Teams & Retaining your Top Performers in the Public and Education Sectors
This session explores the complexities of building cohesive and effective IT teams in the public and education sectors, highlighting the challenges of attracting and retaining top talent in a competitive landscape dominated by the private sector. It addresses the hurdles posed by budgetary constraints, bureaucratic hiring practices, and the difficulty in offering competitive compensation and benefits, while also emphasizing the critical role of a positive organizational culture and ample professional development opportunities. The discussion further underscores the importance of strategic team-building initiatives in creating an environment that not only draws but also retains high-performing IT professionals, ensuring the long-term success and innovation of public and educational institutions.
Speakers:
Chaim Yudkowsky, CIO, AIPAC
Washington Ricardo Izquierdo, CIO/CISO, Pillar College
Helen Knight, Vice President, Information Technology, Legal Aid Alberta
11:00 PM - 11:30 PM EST
WORKSHOP - The 5 Dysfunctions of a Team
In this workshop, we will discuss the premise of Patrick Lencioni’s book “The Five Dysfunctions of a Team” and the commitments to build a cohesive team. This is a great tool for leaders and managers looking to make their teams more effective. This is the perfect starting place for anyone looking to overcome team dysfunction and realize their potential. Simplicity is the key. Building a healthy team is not complicated, but it takes discipline and focus.
Speaker: Steve Demeritt, Global Head of IT Service & Delivery, Black & Veatch
11:40 AM - 12:20 PM EST
PRESENTATION - Securing the Future: Navigating Technological and Cybersecurity Frontiers in the U.S. Northeast
In an era where technology’s rapid evolution reshapes industries, we present a pivotal workshop designed to address the unique challenges and opportunities at the intersection of innovation, security, and regulation. This workshop comprises three critical segments, each tailored to the primary sectors represented at the forum—financial, SLED (State, Local, and Education), and healthcare—focusing specifically on the U.S. Northeast region.
Speaker: Byron Estrada, Head of Global Cyber Threat Intelligence, Air National Guard
12:20 PM - 1:20 PM EST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, palates, and preferences. Vegan, vegetarian, halal options available
1:25 PM - 2:15 PM EST
ROUNDTABLE + PANEL - Translating Cybersecurity Strategy into Action
During this session we will discuss how to bridge the gap between theoretical cybersecurity frameworks and their practical implementation within organizations. It offers insights into effectively translating high-level security strategies into actionable steps that can be understood and executed by IT teams and security professionals. The session emphasizes the importance of aligning cybersecurity measures with business objectives to ensure both are resilient against evolving digital threats.
Moderator: Nish Majmudar, CISO, Mathematica
Panelists:
Jay Nerger, Director, Risk Solutions, The Clearing House
Shai Perez, Global Head of Permitting, CISO, Citi
Diane Huff, Senior VP, Technology, Triangle Services
Bob Gaines, Director, Security, PKF O’Connor Davies
2:25 PM - 2:55 PM EST
PRESENTATION - Two Risk Management Techniques to Easily Improve Security Efficacy
Enterprise software is big, complex, and frankly unique amongst most IT systems. It’s running the business with extensive customizations, third party integrations, open source software/modules, and it’s THE prime target for malicious actors. Join me today to learn two ways that you and your team can make your Risk Management processes more effective, and more efficient.
Speaker: Gabe Dimeglio, GVP & GM, Rimini Protect™, Rimini Street
Presented by: Rimini Street
2:55 PM - 3:10 PM EST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
3:10 PM - 3:40 PM EST
WORKSHOP 1 - IPv6 and Its Impact on Cybersecurity, Emerging Technologies, and the Future of Internet
In the era of AI, IoT, blockchain, and many other emerging technologies, it’s a daily nightmare encountered by organizations from both the public and private sectors, struggling to react to the aftermath of the constant cybersecurity breaches and ransomware attacks.
The situation can only get worse in the coming years when the global IPv6 adoption rate will reach 100% running in parallel with IPv4, effectively doubling the overall attack vectors. Thus, we must change our cybersecurity strategy dramatically now to efficiently secure and effectively defend the global network infrastructure by securely deploying the single stack of IPv6 and turning off IPv4 before the time runs out. It is high time to adopt and enforce a global IPv6-only policy by disabling IPv4 globally.
Speaker Undisclosed
3:10 PM - 3:40 PM EST
WORKSHOP 2 - The Cybersecurity Pie: Protect, Prevent and Predict
Let’s dive into each slices of this pie to identify various different controls and build a comprehensive cybersecurity program with multiple layers of defense.
Speaker: Nish Majmudar, CISO, Mathematica
3:50 PM - 4:20 PM EST
WORKSHOP 1 - Balancing AI With The Indispensable Human Element in Cybersecurity
Artificial Intelligence is a pervasive part of our lives today, and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.
Join this session to discuss:
- What these trends mean for the hands-on practitioner
- What happens when the velocity of innovation outpaces the capabilities of human intellect
- The evolving role of automation in the effective practice of securing our digital world
Speaker: Michael Leland, Chief Cybersecurity Evangelist, SentinelOne
Presented by: SentinelOne
3:50 PM - 4:20 PM EST
WORKSHOP 2 - Sustainable ITOps- Unlock Next-level ITSM, AIOps and FinOps with Next Generation AI
The hype around generative AI is only the beginning. This game-changing technology is poised to disrupt high-tech industries. But with new AI tools popping up every day, choosing the wrong one can have profound effects on a company’s security, customer satisfaction, and productivity.
As a trusted partner, OpenText is pioneering the era of new possibilities where generative AI complements human creativity to become tomorrow’s solutions across DevOps and ITSM.
In our talk, we will cover how OpenText AI and automation:
- Predicts and anticipates software delivery times.
- Unlocks deep insights into projects and potential risks.
- Addresses skilled staff shortages and optimizes service desk costs.
- Minimizes manual repetitive tasks and resolves issues without ethical compromise.
Speaker: Eric Fisher, Senior Presales Consultant, OpenText
Presented by: OpenText
4:25 PM - 5:15 PM EST
ROUNDTABLE + PANEL: Driving The Business Through Technology
It is no secret that technology is changing the fabric of business operations and outcomes, and collaboration between IT and the business is more important than ever before. The conversation is no longer about how to align IT with the business, however in many cases technology is still viewed as a commodity rather than an enabler. So what can we do to successfully change this mindset both within our own organizations and across the industry as a whole? During this session, we will discuss the various challenges IT and digital leaders face when undergoing this cultural shift.
Moderator: Karl Forsberg, Senior Director IT, Infrastructure & Operations, North American Partners in Anesthesia
Panelists:
Anthony Almanzar, Vice President & Senior Technical Program Manager, State Street Global Advisors
Deshard Stevens, Senior Director of IT, NAACP LDF
Sholom Ellenberg, CIO, JASA
Tiffany Welsh, Director, Organizational Change Management, Omnicom Media Group
6:00 PM - 7:00 PM EST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM EST
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM EST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:40 AM EST
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
Moderator: Kin Wai Chau, Sr. Sales Engineer, Cyera
Panelists:
Montae Brockett, CIO/CISO, DC Department of Health Care Finance
Jeff Ericson, CISO/VP, MedRisk
Bradley Schaufenbuel, CISO, Paychex
Supro Ghose, CISO, EagleBank
09:50 AM - 10:20 AM EST
WORKSHOP 1 - Cybersecurity for the AI Revolution
User identities, endpoints, applications, and networks have all turned into attack vectors, expanding the attack surface and elevating business risk.
Point security solutions target an area but often fail to integrate well with others. This leads to a false sense of security, leaving security gaps and exposing organizations to cyber risks and costly remediation efforts.
Join us to:
- Discover key considerations when building an AI-powered Zero Trust security architecture
- Learn how best-in-class integrated solutions provide superior security and improve operational efficiencies
- Hear from our customers on how to future-proof your security investments as threats evolve in the face of AI
- Watch integration demos showcasing real-life scenarios that empower security teams on how to build robust end-to-end protection
Speaker: Gaurav Ranjit, Senior Customer Success Manager, Okta
Presented by: Okta
10:20 AM - 10:35 AM EST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:40 AM - 11:10 AM EST
WORKSHOP - How the Technology Leader has Become the Business Leader
Technology leaders are now key players in strategic decision-making processes. Their insights are crucial for identifying new business opportunities, assessing risks, and making informed decisions that balance innovation with sustainability. They play a vital role in developing strategies that capitalize on digital transformation, data analytics, and artificial intelligence to drive growth and efficiency.
Speaker: Stephen Framil, Corporate Global Head of Accessibility, Merck
11:20 AM - 11:50 AM EST
WORKSHOP - Steering Organizations in the Age of AI
In today’s fast-paced and ever-evolving business landscape, leaders are faced with the daunting task of navigating the complexities of the digital age. As artificial intelligence continues to reshape industries and redefine the nature of work, leaders must embrace a futurist mindset to drive innovation and success. This presentation will empower leaders to embrace the role of futurist leaders and leverage the potential of AI to propel their organizations forward into the future.
Speaker: Dr. Valarian Couch, Director of InfoSec Ops, Planned Parenthood
12:00 AM - 12:30 AM EST
WORKSHOP 2 - Digitalization in the Nonprofit Sector
In social profit, there is often a gap between Leadership vision & the perceived capability of Information Technology to enable mission. Learn from internationally renowned Nonprofit Technology visionary Helen Knight as she presents social service case studies of technology transformations that enabled measurable social improvements.
Key takeaways:
- Learn how to deliver meaningful change even when facing significant technical debt & budget limitations
- Learn how your technical & leadership skills can make a positive difference in the nonprofit sector today
Speaker: Helen Knight, Helen Knight, Vice President, Information Technology, Legal Aid Alberta
12:30 PM - 1:30 PM EST
SINC NETWORKING LUNCH
Northeast Executive Advisory Council
Eugene Kogan
Global IT Director, Head of IT and Security
Population Council
Michael Marsillio
CISO
Paradies Lagardere
Ashok Narayan
Global Director of Applications and Emerging Technology
Tosca Services
Gina Bennett
Director of Enterprise Solutions
YMCA of Metropolitan Atlanta
Kenneth Foster
Global Head of Architecture
Adient
Kenneth Viciana
VP, Global Data & Analytics Products
TSYS
Lorenzo Hines
Global SVP of Information Technology
Citi
Tanweer Surve
Head of Cloud Center of Enablement & Solutions Engineering
PNC Bank
Bradley Schaufenbuel
VP & CISO
Paychex, Inc
Stephen Demeritt
Global Head of IT Services & Delivery
Black & Veatch
Mitesh Patel
VP of IT
JP Morgan
John Whiting
Global Director Cyber Risk
Omnicon
Michael Onuoha
Head of Engineering & Architecture, Risk, Fraud & Collections
Citi
Nish Majmudar
VP & Chief Information Security Officer
Mathematica
Andy Flatt
SVP & CIO
National Healthcare
Deena Swatzie
VP, Head of Technology Risk
LPL Financial
Karl Forsberg
Senior Director IT, Infrastructure and Operations
North America Partners in Anesthesia
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor
platinum
Rimini Street
More than 4,900 Fortune 500, Fortune Global 100, midmarket, public sector and other organizations from a broad range of industries have relied on Rimini Street as their trusted application enterprise software products and services provider. To learn more, please visit www.riministreet.com.
Learn Moregold
Cyera
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.
Learn Moregold
LMNTRIX
LMNTRIX is the leader in intelligence led security-as-a-service. Working as a seamless, scalable extension of customer security operations, LMNTRIX offers a single MDR solution called Active Defense that blends their cyber defense platform called LMNTRIX XDR with innovative security technologies, nation-state grade threat intelligence and world-renowned Cyber Defence Centers. With this approach, LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.
Learn Moregold
Delphix
Delphix is the industry leader for DevOps test data management.
Businesses need to transform application delivery but struggle to balance speed with data security and compliance. Our DevOps Data Platform automates data security, while rapidly deploying test data to accelerate application releases. With Delphix, customers modernize applications, adopt multi-cloud, achieve CI/CD, and recover from downtime events such as ransomware up to 2x faster.
Leading companies, including Choice Hotels, Banco Carrefour, and Fannie Mae, use Delphix to accelerate digital transformation and enable zero trust data management. Visit us at www.delphix.com. Follow us on LinkedIn, Twitter, and Facebook.
More from Delphix:
Gorilla Guide to Choosing the Right Data Masking Solution for DevOps Data
3 Ways to Mitigate the Growing Risk of Non-Production Environment Breaches
Learn Moregold
Okta
Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 10,000 organizations, including JetBlue, Nordstrom, Siemens, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.
Learn Moregold
SentinelOne
SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation, and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks.
More from SentinelOne:
Learn Moregold
Tanium
Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium unifies teams and workflows and protects every endpoint from cyber threats by integrating IT, Operations, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale.
Learn Moregold
OpenText
Your data is your company’s most strategic asset. Analytics and AI helps you monetize that asset with a trusted technology partner and proven product portfolio. Big data whether structured, unstructured, mining or discovery, the OpenText Analytics and AI portfolio – led by OpenText Vertica™, OpenText IDOL™, and OpenText Magellan™ – can help you deliver the strategic insights that your organizations need to make every data-driven decision and predict and act on business opportunities – all while managing risk and costs.
Learn Moregold
Cymulate
Cymulate, the leader in exposure management and security validation, provides a modular platform for continuously assessing, testing, and improving cybersecurity resilience against emergent threats, evolving environments, and digital transformations. The solution has a quantifiable impact across all 5 continuous threat exposure management (CTEM) program pillars and on a business’s ability to reduce risk by understanding, tracking, and improving its security posture. Offerings include Attack Surface Management (ASM), Breach and Attack Simulation (BAS), Continuous Automate Red Teaming (CART), and Exposure Analytics solutions. For more information, visit www.cymulate.com.
More from Cymulate:
Practical Guide to Exposure Management
Exposure Management & Security Validation
Learn Moresilver
Cyberhaven
Your important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. Cyberhaven protects data anywhere it goes in the extended enterprise. You can’t protect what you can’t see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can’t.
More from Cyberhaven:
Learn Moresilver
Legit Security
Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization’s software supply chain from attack. Our enterprise-grade platform helps CISOs, application security and development teams successfully defend against the latest threats to your pre-production development environments and helps ensure governance, compliance, and integrity for every software release. The platform’s ability to auto-discover, analyze and secure from code-to-cloud in a single platform enables it to contextualize security risks, consolidate vulnerability management, and prioritize remediation so that AppSec programs can keep their businesses safe while releasing software fast.
Learn More